Internet Anthropologist Think Tank: 5/25/08 - 6/1/08

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, May 31, 2008

    Baitullah Mehsud, virtual or double?

    Baitullah Mehsud, virtual or using a double?

    Two vids two different people.

    Is he even real?

    Look at these photos.

    Baitullah.jpg

    Baitullah Mehsud from a recent Taliban video. SOURCE:

    OR

    Baitullah Mehsud Baitullah Mehsud is reluctant to be photographed

    SOURCE:

    OR


    Shoulder length hair, center, left, hair and shoulder, from his most recent video.

    Taliban leader. Baitullah Mehsud photo ( our art work )





























    Gerald

    .

    Labels: , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Search over 1,200 terrorist web sites



    Search over 1,200 terrorist web sites, forums etc.
    ( you need to enable Gmodules script, Fire fox click on "Noscript" )

    Feds may request list of sites.

    Second search box above.

    If you want your site removed from the search engine,
    Email me at generalEmail4 at gmail.com

    Search current terrorist sites, 1,200+. pages indexed: 7,600,000

    Gerald

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Pentagon getting close.






    United States ArmyImage via WikipediaUSA military getting close to an effective Internet Paradigm.
    But they are still missing the point.

    MilSpace has the spirit but misses the key point.
    It is secret, high grade encrypted, NON PUBLIC.

    But there is hope they have laid the seeds of self discovery, they will trip over the correct Paradigm, even if their boots are not laced. Read the following.

    "Kimball attributes much of his organization's successes to consistent support from the Army's graduate-level academic establishment centered on Ft. Leavenworth, Kans. The top general at Leavenworth, William Caldwell, even announced in May that blogging would be part of the formal graduate curriculum going forward."
    Great article
    Permalink

    The terrorist have thousands of web sites promoting thier lies, propaganda, and violence.
    The USA has a hand full of sites, and the State Department has 30 people trying to counter the propaganda.

    Train your troops and turn them loose with their own blogs.They will counter the terrorist, and give voice to USA perspective.

    To be sure the Terrorist have secret sites, but most are public, for funding, recruting and propaganda. USA is not recruiting Muslim counter terrorist on the net. And they do have the ability to do so.

    The military could have thousands of sites promoting USA, but they don't, they are still functioning with the wrong paradigm.

    But they have picked up on errors in the old paradigm and corrected them faster than I thought possible. They are evolving faster than al Qaeda ever has.

    A lie posted often enough, in enough places, and not countered becomes the TRUTH, on the Internet... Is a paradigm the Military has yet to learn.

    I submitted a classified white paper to the Air Force when they called for paradigms on the WWW war.
    And to DHS, NICC.

    "Internet WAR Paradigm:"
    Dominant Cyber Offensive Engagement and Supporting Technology.
    We are Paradigm Architects.
    Observation, synthesis and action are the essence of applied Anthropology.

    "New uses and discoveries for the INTERNET will center on "PROCESS" & "ORGANIZATION".
    USA military still lacks a comprehensive, effective WWW paradigm.
    And from what I've seen the most advanced services a year away from having one.

    Gerald
    Internet Anthropologist, ad Magnum
    .






    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    What could Paki do with $45 usd million a year


    Pakistani Taliban commander spends $45 million yearly

    Baitullah.jpg

    Baitullah Mehsud from a recent Taliban video.

    Baitullah Mehsud, the leader of the Pakistani Taliban and the commander in South Waziristan, spends more money on yearly operations than al Qaeda spent year prior to the Sept. 11, 2001, attacks, according to the governor of the Northwest Frontier Province.

    "He is spending between Rs 2.5 - 3 billion [about $45 million] yearly on procuring weapons, equipment, vehicles, treating wounded militants and keeping families of killed militants fed," Governor Owais Ahmed Ghan told Daily Times. Ghan said the money could not have come from donations alone; the opium trade in Afghanistan is filling Baitullah's coffers.

    Most of the money is spent on "the means of communication — vehicles, fuel and equipment — and then on treatment of wounded fighters, and lastly on keeping the killed comrades’ families fed," Zulfiqar Mehsud, an aide to Baitullah, told Daily Times last March. "We have to change vehicles after we use them for a year. Every vehicle at our disposal must be in top condition because we have very rough and tough roads and hilly areas and cannot afford to keep vehicles that are not as fit as our job requires."

    Baitullah is thought to operate a force of more than 20,000 fighters, some of whom are professionally trained. His forces beat back Pakistani Army assaults in 2007 and 2008, and overran two military outposts in South Waziristan. His fighters also captured an entire Pakistani Army company without firing a shot.

    The operating costs for Baitullah's forces in South Waziristan exceed that of al Qaeda, according to numbers compiled by the 9-11 Commission and terrorism expert Rohan Gunaratna. The 9-11 Commission report says al Qaeda central spent an estimated $30 million for yearly operations, which included salaries for members, the operation of training camps, weapons, vehicles, and the development of training manuals.

    Al Qaeda also spent an estimated $10 million–$20 million per year to receive a safe haven from the Taliban in Afghanistan. "Bin Laden also may have used money to create alliances with other terrorist organizations, although it is unlikely that al Qaeda was funding an overall jihad program," the 9-11 Commission Report states. "Rather, Bin Laden selectively provided startup funds to new groups or money for specific terrorist operations."

    Gunaratna's numbers are similar. He estimates al Qaeda spent $36 million a year on operations in Afghanistan, and another $14 million for global operations, putting the yearly budget at about $50 million. Gunaratna’s estimate of al Qaeda's funding of the Taliban and allied terrorist movements is much higher than the 9-11 Commission Report's estimate.

    "To buy loyalty, Al Qaeda also funded individuals in various Islamist groups, including the Taliban, to the tune of $100 million," Gunaratna said, citing US intelligence sources.

    taliban-presentation-thumb.JPG

    Multimedia presentation of the senior Taliban commanders in Pakistan and Afghanistan. Click to view.

    Baitullah is but one Taliban commander

    While Baitullah is arguably the most important and capable Taliban leader in Pakistan's tribal areas and in the Northwest Frontier Province, he is not the only one. The $45 million cited does not extend to leaders such as Faqir Mohammed in Bajaur, Mullah Fazlullah in Swat, the Haqqanis in North Waziristan, Mangal Bagh Afridi in Khyber, Omar Khalid in Mohmand, and others in the region.

    And Baitullah may not be receiving the largest funding in Pakistan, a senior US military intelligence source familiar with the Taliban in Pakistan told The Long War Journal. Bajaur's Faqir Mohammed may be receiving more money than Baitullah, the source said.

    Faqir has close links to al Qaeda (he is believed to have sheltered Ayman al Zawahiri several times) and Bajaur serves as an al Qaeda command and control center for operations into eastern Afghanistan. His safe houses and training camps have been the target of several US airstrikes since 2006.

    SOURCE:

    For more information on the terms of the peace agreements in Swat, Bajaur, and Mohmand, and the proposed terms for the agreements in South Waziristan and Kohat, see:

    Pakistani government inks peace deal with Swat Taliban
    Pakistan is negotiating a new peace agreement with Baitullah Mehsud (South Waziristan)
    Pakistan releases Taliban leader, signs peace deal with outlawed Taliban group (Bajaur, Malakand Division)
    Pakistan strikes deal with the Taliban in Mohmand
    Negotiations with the Taliban under way in Kohat

    See The Fall of Northwestern Pakistan: An Online History for more information on the rise of al Qaeda and the Taliban in Pakistan and the peace agreements signed between the government and the Taliban.

    XXXXXXXXXXXXXXXXXXX

    $45 MILLION what a waste, how many Muslims have the Taliban killed?
    How many Mosques have they bombed, market places, women and children killed?

    What drug dealers are they working with, put a CIA team on any Drug cartels they work with,
    Black wet ops, on the drug partners.

    Gerald

    .

    Labels: , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Allah guide our hearts to reason

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Blind seven-year-old beaten to death for failing to memorize the Koran


    Blind Muslim seven-year-old beaten to death for failing to learn the Koran



    The parents of a blind seven-year-old who was sent to a religious school in Pakistan have told how he was hung by his feet from a ceiling and beaten to death after failing to memorise the Koran.

    The parents of Mohammed Atif admitted that they had ignored their son Mohammed's repeated complaints about abuse at the madrassah.

    Police in the Punjab province said that Mohammed's religious teacher, Qari Ziauddin, was now in custody charged with torturing and murdering the boy on Thursday.

    Police said Ziauddin, whose title "Qari" signifies he is a mullah, had suspended the boy from a ceiling fan for an hour before he beat him. When he realised how badly Mohammed was hurt, he apparently fled instead of taking him to hospital.
    ...............
    The boy's body was not discovered until the next day when fellow pupils, including Mohammed's cousin, realised he had not slept in his bed. They searched the madrassah and found his battered corpse in Ziauddin's room.

    An autopsy concluded that Mohammed, who was blind from birth, died of severe head injuries and also found marks of "physical torture" on his body. Police said the fatal blow might have been caused by Ziauddin dropping the boy when he cut him down from the fan.

    According to the boy's father, the teacher had previously smashed him over the head with an iron rod, cutting him so badly that he needed stitches.

    ....

    The killing has sparked concerns for the welfare of the 1.5 million students in the country's 13,000 madrassahs, which are regarded as potential recruiting grounds for al-Qa'eda and the Taliban.

    In 2002 President Pervez Musharraf responded to international concerns by ordering madrassahs to adopt a more modern curriculum. But religious hardliners have stymied many of the reforms, and their refusal to allow state regulation has also seen the schools develop an reputation for child abuse.

    While officialdom often turns a blind eye, the sheer brutality of the latest case has led the new prime minister, Yousuf Raza Gilani, to order an inquiry.

    Police said the other children who attend the Qari Latif madrassah in Vihari, 150 miles southwest of Lahore, have all been withdrawn.

    Investigators said Ziauddin had admitted the assault and claimed such brutality was normal. "We punish students who don't learn their lessons," he told detectives. "We used to get similar beatings when we were studying in the same schools. It is not uncommon."...

    xxxxxxxxxxxxxxxxxxxxxxxxxx

    For Qari ? Ziauddin, Satan has a special place for him,



    Gerald

    .

    Labels: , , , , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Sir Hugh, CONFUSED


    We should talk to al-Qaeda, insists police chief


    Published Date: 31 May 2008
    By Rhiannon Edward
    ONE of Britain's senior policemen said yesterday the country should negotiate with al-Qaeda in a strategy to end its campaign of violence.
    Sir Hugh Orde, head of the Police Service of Northern Ireland, said he could not think of a single terrorism campaign in history that ended without negotiation.

    Sir Hugh, reportedly a front-runner to be the next Metropolitan Police chief, said that 30 years of tackling the IRA convinced him that policing was not enough alone to defeat terrorists.

    He said: "If you want my professional assessment of any terrorism campaign, what fixes it is talking and engaging and judging when the conditions are right for that to take place.

    "Is that a naive statement? I don't think it is … it is the reality of what we face.

    "If somebody can show me any terrorism campaign where it has been policed out, I'd be happy to read about it, because I can't think of one."

    Sir Hugh admitted negotiating with terrorists meant "thinking the unthinkable" and said that some of the biggest risks his officers took were talking to people that "historically they would not have dreamed of talking to".

    He cited his 2004 meeting with Sinn Fein leader Gerry Adams as an example of how one-time enemies can become partners in peace.

    Asked if he was saying "we should talk to al-Qaeda", Sir Hugh replied: "I don't think that's unthinkable."

    He also called for the number of police forces to be slashed from 43 to nine to better fight terrorism.

    Sir Hugh added Irish terrorists still wanted to bomb the UK mainland. They were trying to buy weapons but were disorganised, "psychopathic" and probably numbered no more than 200.
    SOURCE:
    xxxxxxxxxxxxxxxxxxxxxxxxxx

    Sir Hugh, reportedly a PAST front-runner to be the next Metropolitan Police chief,
    wants to ask the snake to quit biting, they attacked America, and Britain, KILL AL QAEDA DON'T TALK TO THEM, THIS MESSAGE NEEDS TO BE CLEAR TO FUTURE TERRORISTS.

    Gerald

    ..

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Youtube Smack down.

    IMG_6421Image from FlickrWe support youtube smack down with Company B, a Black wiki, and backed by Company C.



    2smackj.JPG


    Google needs a protocol for taking out Youtube members not just videos.

    Gerald

    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Un-ban PMOI


    Is Iran’s Mujahideen-e-Khalq a Threat to the Islamist Regime?

    By Chris Zambelis

    MEK Head Maryam Rajavi
    The People’s Mujahideen of Iran (PMOI), more commonly known as the Mujahideen-e-Khalq (“people’s mujahideen”; MEK), is one of the most organized and controversial Iranian opposition groups. Although it maintains an armed wing—known as the National Liberation Army (NLA)—and numerous front organizations, it derives its greatest strength from the slick lobbying and propaganda machine it operates in the United States and Europe. The MEK also boasts extensive support within U.S. government and policy circles, including many of the most vocal advocates of a U.S. invasion of Iran [1].

    The MEK remains on the list of banned terrorist organizations in the United States and European Union (EU). Both parties have indicated no intention of reconsidering their positions. The May 7 decision by the United Kingdom’s Court of Appeal to overrule the British government’s inclusion of the MEK on its list of banned terrorist organizations, however, may pave the way for both the United States and EU to reassess their positions regarding the MEK down the line. Given the MEK’s history of violence and its willingness to act as a proxy force against Iran, such a move would represent a major escalation in hostilities between the United States and Iran, with consequences in Iraq and beyond.

    SOURCE:

    XXXXXXXXXX

    UN-BAN THEM.

    Gerald

    .


    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Friday, May 30, 2008

    Comcast spying, $1,000 a day

    Comcast Is Hiring an Internet Snoop for the Feds

    By Noah Shachtman EmailMay 30, 2008 | 2:42:00 PM

    Governmentseewebsite3 Wanna tap e-mail, voice and Web traffic for the government? Well, here's your chance. Comcast, the country's second-largest Internet provider, is looking for an engineer to handle "reconnaissance" and "analysis" of "subscriber intelligence" for the company's "National Security Operations."

    Day-to-day tasks, the company says in an online job listing, will include "deploy[ing], installing] and remov[ing] strategic and tactical data intercept equipment on a nationwide basis to meet Comcast and Government lawful intercept needs." The person in this "intercept engineering" position will help collect and process traffic on the company's "CDV [Comcast Digital Voice], HSI [High Speed Internet] and Video" services.

    Since May 2007, all Internet providers have been required to install gear for easy wiretapping under the Communications Assistance for Law Enforcement Act, or CALEA. Anyone taking this position, Comcast says, will have to be "knowledgeable with ... standards such as CALEA." (The company is all too happy to "intercept its customers’ communications" for a fee of a thousand dollars, Secrecy News revealed last year.)

    But the person in this job won't just be snooping for the government. He or she will also "perfor[m] diagnosis on data, voice, and video services to detect and respond to fraudulent activity such as theft of service and speed enhancement."

    For the better part of a year, there have been rumors that the company kept some sort of bandwidth limit on its customers. Finally, in February, Comcast admitted that it had been "clamping down on subcribers' file-sharing as a way of keeping overall net traffic up.

    The job requires a "B.S. Degree in Information Systems Technology, MIS or related field or equivalent years of progressive experience and self-study," a minimum of two years of policy or security engineering experience," as well as the "ability to carry and coordinate delivery of a 50-pound server to support deployments in local market."

    If that's too much for you, don't worry. The company is also looking for an administrative assistant in its National Security Operations office. In that position, you'll be able to handle "sensitive incoming Legal subpoenas and other material. Some of this material may be 'Secret/Top Secret' and be classified under applicable Federal Law."

    {Photo: HowStuffWorks.com; sneaky: RB]

    SOURCE:

    .

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, May 29, 2008

    Why has al Qaeda given Iran a free pass in Palestine

    Tehran skyline with Milad Tower in the background.Image via WikipediaWhy has al Qaeda given Iran a free pass in Palestine? G



    Report: Iran, al-Qaeda holding clandestine talks

    American news agency reports: US intelligence sources believe al-Qaeda, Iran recently conducting covert negotiations over 2 of Bin Laden's sons, currently under 'loose house arrest' in Iran

    Yitzhak Benhorin
    Published: 05.30.08, 00:32 / Israel News

    WASHINGTON – In recent months there have been secret contacts between the Iranian government and the leadership of al-Qaeda, top officials in the White House, the Pentagon and the intelligence community said Thursday.


    Iranian Threat
    US: Strong reasons to suspect Iran was working covertly to build atomic bomb / AFP
    Western diplomat says IAEA 'alarmed' that Islamic Republic in possession of document describing process of machining uranium metal into two hemispheres of the kind used in nuclear warheads. Iran's ambassador to UN atomic watchdog says intelligence 'lousy, fake'
    Full story
    US officials familiar with highly sensitive intelligence on this issue told the ABC News Agency that the contacts are on the status of high-level al-Qaeda operatives, and include two of Osama Bin Laden's sons, who have been under house arrest in Iran since 2003. The officials don't believe Iran will allow these operatives to go free, but said they don't know Iran's motivation for initiating the talks.


    "Iran likely sees these individuals as major bargaining chips," one official said. "How and when they're going to use those chips or whether they are going to keep them in the bank is part of an ongoing strategic discussion they are having internally."


    Shortly after the US invaded Afghanistan in late 2001, al-Qaeda's central leadership broke into two groups. US intelligence believes that one group, headed by Osama bin Laden and Ayman al Zawahiri, fled to the east to find safe haven in Pakistan's tribal areas.


    The second group went west to Iran, and intelligence analysts postulate that this group includes al-Qaeda's management council, or "shura," which numbers about two dozen militants, including Adel, al-Qaeda spokesman Suliman abu Ghaith and some of Bin Laden's relatives, including two of his sons, Saad and Hamza.


    These militants are considered to be among the most dangerous terrorists in the world. Adel is on the FBI list of Most Wanted Terrorists and is a suspect in the 1998 bombings of the US embassies in Kenya and Tanzania. The State Department has put a $5 million bounty on his head.


    Iranian authorities detained these militants in 2003, and they have been under what one US official called "loose house arrest" in Iran ever since. The US government quietly sent messages to Iran through the Swiss government, requesting that the al-Qaeda figures be turned over to their native countries for interrogation and trial. Iran has refused.


    "Al-Qaeda would like to get those folks a deal and they've been trying to work a deal," a senior defense official told ABC News.


    US intelligence analysts have several theories as to why al-Qaeda and Tehran have recently renewed contact. According to one theory, Iran initiated the talks as a threat to the United States; so that if the US takes hostile action against Iran, these captives could be released, and set free to plot attacks against the West.

    http://www.ynetnews.com/articles/0,7340,L-3549719,00.html

    http://snipurl.com/2bh8e

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Bin Laden doesn't mind using other's children for suicide bombers, but won't risk his kids. He has even bent to Iran's will to protect them.
    Can't expect them to risk life and limb....
    Biny was a political Whore.

    Gerald

    ,

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    RUMINT, China


    This just in: Authorities in three West European countries have arrested ten individuals whom they believe to have links to Islamic Extremist factions in Uzbekistan. It is reported that those arrested were obtaining funding for a militant group within Uzbekistan that allegedly has ties with al-Qaida.

    Yuldeshev and his Uzbeks are going to be trouble, many are Russian Army trained, very disciplined and they play rough. Rumors are that the Chinese are terrified of them regarding the Olympics, talk of a dirty bomb there. The Uzbeks would do it and they have all the access they need with the Tibetans

    SOURCED Co C.

    xxxxxxxxxxxxxxxxxx

    Excerpts:
    China's Cyber Militia

    by Shane Harris

    One prominent expert told National Journal he believes that China's People's Liberation Army played a role in the power outages. Tim Bennett, the former president of the Cyber Security Industry Alliance, a leading trade group, said that U.S. intelligence officials have told him that the PLA in 2003 gained access to a network that controlled electric power systems serving the northeastern United States. The intelligence officials said that forensic analysis had confirmed the source, Bennett said. "They said that, with confidence, it had been traced back to the PLA." These officials believe that the intrusion may have precipitated the largest blackout in North American history, which occurred in August of that year. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected.....There has never been an official U.S. government assertion of Chinese involvement in the outage, but intelligence and other government officials contacted for this story did not explicitly rule out a Chinese role. One security analyst in the private sector with close ties to the intelligence community said that some senior intelligence officials believe that China played a role in the 2003 blackout that is still not fully understood.
    ..............

    The Central Intelligence Agency's chief cyber-security officer, Tom Donahue, said that hackers had breached the computer systems of utility companies outside the United States and that they had even demanded ransom. Donahue spoke at a January gathering in New Orleans of security executives from government agencies and some of the nation's largest utility and energy companies. He said he suspected that some of the hackers had inside knowledge of the utility systems and that in at least one case, an intrusion caused a power outage that affected multiple cities. The CIA didn't know who launched the attacks or why, Donahue said, "but all involved intrusions through the Internet."

    ......................
    "Cyber-networks are the new frontier of counterintelligence," Brenner emphasized. "If you can steal information or disrupt an organization by attacking its networks remotely, why go to the trouble of running a spy?"

    Stephen Spoonamore, CEO of Cybrinth, a cyber-security firm that works for government and corporate clients, said that Chinese hackers attempt to map the IT networks of his clients on a daily basis. He said that executives from three Fortune 500 companies, all clients, had document-stealing code planted in their computers while traveling in China, the same fate that befell Gutierrez.


    .................

    Private Sector Foot-Dragging

    There is little indication that cyber-intrusions, however menacing, have severely impaired government operations for very long. So why are so many officials increasingly sounding the alarm about network attacks, Chinese hacking and espionage, and the advent of cyberwar?

    Part of the answer lies in officials’ most recent appraisals of the cyber-threat. They cite evidence that attacks are increasing in volume and appear engineered more to cause real harm than sporadic inconvenience. Without naming China, Robert Jamison, the top cyber-security official at DHS, told reporters at a March briefing, “We’re concerned that the intrusions are more frequent, and they’re more targeted, and they’re more sophisticated.”

    “In terms of breaches within government systems, it’s something that has happened quite a bit over the last six, seven years,” says Shannon Kellogg, the director of information-security policy for EMC Corp., which owns RSA, a top cyber-security research firm. “But the scale of these types of breaches and attacks seems to have increased substantially.”

    Government officials are more concerned now than in recent years about the private sector’s inability, or unwillingness, to stop these pervasive attacks. When Donahue, the CIA cyber-security officer, warned the gathering in New Orleans about foreign hackings of power plants, some saw it as a direct challenge to American companies.


    .......................

    The Air Force is in the process of setting up a Cyberspace Command, headed by a two-star general and comprising about 160 individuals assigned to a handful of bases. As Wired noted in a recent profile, Cyberspace Command "is dedicated to the proposition that the next war will be fought in the electromagnetic spectrum and that computers are military weapons." The Air Force has launched a TV ad campaign to drum up support for the new command, and to call attention to cyberwar. "You used to need an army to wage a war," a narrator in the TV spot declares. "Now all you need is an Internet connection."


    SOURCED: MUCH MORE:

    xxxxxxxxxxxxxxxxx

    Internet Anthropologist cyber team has pointed out that the WWW is currently at risk.

    And emailed DHS's NICC information on a new NEW VECTOR EXPLOIT.
    and have yet to hear back from them, " it " can walk thru all current security programs and Vista isn't even a constraint, nor are MACs.

    Our sources place the number of Chinese hackers in the 11,000 range.

    Paradigm Intel indicates we are in the middle of a massive invisible infection, motive unknown.
    To see the evidence on your PC down load "Haute secure".
    ( we have no connection to this compan.)


    Gerald
    Internet Anthropologist, ad Magnum

    .


    xxxxxxxxxxxx

    Chinese perspective (w/corrections ) American Economy


    China's actions should trigger SEC. Investigation Insider Trading...


    China hackers penetrate Pentagon ...


    China blackmailing USA, China ...



    Beijing will not do Anything against Iran's Interests

    Pearl Harbor of cyber war

    China is presenting some NEW dangerous paradigm threats in asymmetrical warfare.
    ( and don't forget space weapons, and their new supersonic evasive missiles, ie aircraft carriers )

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    New Bin Laden Image

    New Bin Laden Image



    New Bin Laden Image

    Biny has been suffering from liver disease and heart complications, from the fluid build up.
    He is on O2 (voice print)and has a feeding tube. ( maybe a ventilator ..listen)

    Question is if he is still alive, he is unable to make a fist his fingers are so swollen.

    Ole Binny is either dead or the advanced stages of cirrhosis, with advanced ascites, multiple parencentesis has left his protien levels below 4 and in a near comatose state unable to communicate. His edema has left him almost unrecognizable, his fingers like huge sausages. Problems with the parencentesis leaking and diuretics not working.

    Close friends were able to recognize him.

    The last video of Bin Laden was released in late 2004.

    Thats almost four years without a video . The newest tapes SOUND like biny, but have been heavily edited.


    There is something going on,and its bad for Binny and good for the rest of the world.

    It would also indicate they think its bad for the terrorists moral to disclose the details of his condition or death, either way he dies in bed. NOT a martyr. From a cause sent by Allah.


    No 72 virgins for Binny.

    Would USA let him RIP no,
    USA would dig him up to test his DNA.

    Binny has transposed jahid to Hirabah, and explain it as an Islamic obligation.

    The big picture is to form a global totalitarian state from Spain to Northern Africa to the middle East and into Russia, a kind of Taliban control of Islamic life. This is an illegitimate political movement masquerading as an Islamic cause.

    Binny's death sure would take AQ down a notch.

    not RIP
    but
    BIH
    burn in hell.

    Gerald

    xxxxxxxxxxxxxxxxxxxxxxxxxx

    The Beginning of the End for Al Qaeda?

    By Paul Cruickshank


    Peter Bergen (my colleague at the NYU Center on Law and Security) and myself have a cover story out in the latest issue of the New Republic -- published online last week and now on news stands --- entitled the ‘Jihadist Revolt against Bin Laden.’ We report that key figures in the Jihadist movement, many of them veterans of the Afghan anti-Soviet Jihad, are increasingly publicly repudiating Bin Laden, alarmed by Al Qaeda’s indiscriminate targeting of civilians and the fact that most of its victims since 9/11 have been Muslim.

    Although several veterans of the Afghan Jihad saw 9/11 as an illegitimate attack on civilians and a blunder by Bin Laden because Jihadists lost their ability to train in Afghanistan, the emergence of a fully-fledged ‘Jihadist Critique’ of Al Qaeda was almost certainly delayed by the U.S. invasion of Iraq in March 2003, ‘a cause celebre’ for Jihadists around the world.

    Since then, however, al Qaeda’s brutal campaign of violence in Iraq (over 10,000 Iraqis have been killed by Al Qaeda’s suicide bombers) has horrified even battle-hardened Jihadists, and ideologues once closely aligned with al Qaeda. One such jihadist, Sayyid Imam al Sharif is profiled this week by Larry Wright (also a fellow at the NYU Center on Law and Security) in the New Yorker.

    While mainstream Muslim leaders have long criticized Al Qaeda, the new wave of criticism coming from key figures in the jihadist movement has real extra bite, because it is very difficult for Bin Laden to dismiss the arguments of jihadist leaders who once fought at his side, or provided guidance to his organization, or inspired his recruits. To the degree that this makes radical leaning youngsters from London to Lahore think twice about joining al Qaeda, this could be a watershed moment in the war on terrorism. Here is our assessment of just how impactful this new jihadist critique has been.

    May 28, 2008 08:01 PM Link

    xxxxxxxxxxxxxxxxxxxxxxxx

    From Jawa:

    Report: al Qaeda Discussing "Why we lost in Iraq"

    It seems that the jihadis are finally admitting what we've know for months: they've lost in Iraq. It's stunning. Not so much that al Qaeda has lost in Iraq, but that they're online supporters are now admitting it. Just a few months ago my reading of the online discourse was that al Qaeda's fans were in total denial, continuing to call us the "United States of Losers" in Iraq.

    For any of them to admit defeat is a real victory. If this report is correct, its importance cannot be overstated. Why? Because a key to insurgency recruitment has always been hope for victory. Far fewer people are willing to risk death in a cause they believe they cannot win. Hence, al Qaeda has long pushed propaganda designed to present an image of imminent victory in Iraq.

    Since so many al Qaeda operatives are always dying, a key to keeping up the fight is in recruiting. But the perception of defeat means far fewer recruits, translating into weaker fighting ability.

    Strategy Page:

    Al Qaeda web sites are making a lot of noise about "why we lost in Iraq." Western intelligence agencies are fascinated by the statistics being posted in several of these Arab language sites. Not the kind of stuff you read about in the Western media. According to al Qaeda, their collapse in Iraq was steep and catastrophic. According to their stats, in late 2006, al Qaeda was responsible for 60 percent of the terrorist attacks, and nearly all the ones that involved killing a lot of civilians. The rest of the violence was carried out by Iraqi Sunni Arab groups, who were trying in vain to scare the Americans out of the country.
    Read the rest.



    One of my favorite quotes comes from Rusty at Jawa, we were discussing ops and he said "
    The depth of their stupidity is never ending."

    When fighting the Taliban or al Qaeda this is good to keep in mind.

    Gerald

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    al Qaeda in Iraq, won't fire at chopper.

    Great Video: older:
    But they know better than to fire at choppers, Shooting at the chopper would be a suicide mission,
    and they only use others for suicide missions, because they are cowards. G

    ....

    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    International Audience

    Our International Audience:

    Our readers, Superior Intellects, and better looking than average. G




    International Audience

    Labels:

    Terrorist Names SEARCH:
    Loading

    Wednesday, May 28, 2008

    aQ WMD and star trek too...



    Al Qaeda Supporters' Tape to Call for Use of WMDs
    Authorities: New Tape to Urge Use of Weapons of Mass Destruction on Civilians
    By PIERRE THOMAS and THERESA COOK
    May 27, 2008


    Intelligence and law enforcement sources tell ABC News they are expecting al Qaeda supporters will post a new video on the Internet in the next 24 hours, calling for what one source said is "jihadists to use biological, chemical and nuclear weapons to attack the West."

    al qaeda
    Officials say they expect a new tape from al Qaeda to call for the use of weapons of mass destruction against civilians. The group has released messages with increasing frequency this year.
    (AP Photo)

    "There have been several reports that al Qaeda will release a new message calling for the use of weapons of mass destruction (WMD) against civilians," FBI spokesman Richard Kolko told ABC News in an e-mail.

    "Although there have been similar messages in the past, the FBI and [Department of Homeland Security] have no intelligence of any specific plot or indication of a threat to the U.S.," the e-mail said. "The FBI and U.S. intelligence community will review the message for any intelligence value."

    While there is no evidence of any direct threat, the FBI sent a bulletin to 18,000 law enforcement agencies across the country, out of an abundance of caution.

    Some independent analysts don't think the public should worry much.

    Ben Venzke, the CEO of IntelCenter, a group that monitors terrorist communications on the Web, said the video, entitled "Nuclear Jihad, The Ultimate Terror," is a jihadi supporter video compilation and not from an official group.

    "Supporter videos are made by fans or supporters who may not have ever had any contact with a real terrorist," Venzke said. "These videos almost always are comprised of old video footage that is edited together to make a new video."

    http://abcnews.go.com/TheLaw/FedCrimes/story?id=4941724
    xxxxxxxxxxxxxxxxxxxxxxxxxx

    Terrorist trying to do the terror thing and scare everybody.

    They may call for Star Trek Enterprise to attack USA also, probably will keep the Klingon's out of it.
    NO Chatter or background noise worth noting, they have degraded from operations to dreams.

    Gerald
    Internet Anthropologist

    .








    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, May 27, 2008

    Baitullah Mehsud;s Photo

    Terrorist Names SEARCH:
    Loading

    Knock , knock, no body home....



    5/27: Sohanad.BH Worm Spreads Via Email
    By - May 27, 2008
    W32/Sohanad.BH is a worm that will infect Windows systems and spreads through email.

    5/27: Trojan.Spryct Drops FIles on Compromised System
    By - May 27, 2008
    Trojan.Spryct is a Trojan horse that may download files on to the compromised computer.

    5/27: Dwnldr-HDP Trojan Drops File From Preconfigured URL
    By - May 27, 2008
    Troj/Dwnldr-HDP is a Trojan downloader for the Windows platform.

    5/27: Troj/Dwnldr-HDO a Downloader Trojan
    By - May 27, 2008
    Troj/Dwnldr-HDO is a Trojan downloader for the Windows platform.

    5/27: Bckdr-QNN Trojan Gives Intruder Remote Access
    By - May 27, 2008
    Troj/Bckdr-QNN is a backdoor Trojan for the Windows platform, which allows a remote intruder to gain access and control over the computer.

    5/27: Agent-GZH Trojan Copies Itself, Creates Registry
    By - May 27, 2008
    Troj/Agent-GZH is a Trojan for the Windows platform.

    5/23: NtRootK-DM Rootkit Trojan Targets Windows Systems
    By - May 23, 2008
    Troj/NtRootK-DM is a rootkit for the Windows platform.


    5/23: Zlob.NEB Trojan Displays Fake Pop-Up Message
    By - May 23, 2008
    W32/Zlob.NEB is a Windows systems Trojan that upon execution, drops scm.exe in the folder from which the original file is executed.

    5/23: Nitfun-A Trojan Downloads, Executes More Files
    By - May 23, 2008
    Troj/Nitfun-A is a Trojan that attempts to download and execute further files.

    5/23: Mdrop-BSM Trojan Creates File
    By - May 23, 2008
    Troj/Mdrop-BSM is a Trojan for the Windows platform.

    5/23: VB-DZS Trojan Copies Itself, Creates File and Registry Entry
    By - May 23, 2008
    Troj/VB-DZS is a Trojan for the Windows platform.

    5/23: NtRootK-DN a Windows Rootkit Trojan
    By - May 23, 2008
    Troj/NtRootK-DN is a rootkit Trojan for the Windows platform.

    5/22: Privacy-A Trojan Reduces Internet Privacy Level
    By - May 22, 2008
    Troj/Privacy-A reduces the Internet Zone privacy level to low (accept all cookies).

    5/22: FakeAle-BL Trojan Claims to Have Found Threats
    By - May 22, 2008
    Troj/FakeAle-BL claims to have found security threats.

    5/22: NtRootK-DL a Windows Kernel Drives Trojan
    By - May 22, 2008
    Troj/NtRootK-DL is a kernel driver Trojan for the Windows platform which attempts to silently sniff network traffic.

    5/22: NtRootK-DK a Windows Rootkit Trojan
    By - May 22, 2008
    Troj/NtRootK-DK is a rootkit Trojan for the Windows platform.

    5/22: Mbroot-Gen a Family of Trojan Rootkit Files
    By - May 22, 2008
    Troj/Mbroot-Gen is a family of Trojan rootkit files, usually seen dropped by members of the Troj/Mbroot or Mal/Sinowa family of malware.

    5/22: IRCBot-ABT Trojan Runs Continuously in Background
    By - May 22, 2008
    Troj/IRCBot-ABT Trojan runs continuously in the background, providing a backdoor server that allows a remote intruder to gain access and control over the computer via IRC channels.

    5/22: Bckdr-QNP Trojan Registers Itself as New System Driver Service
    By - May 22, 2008
    When first run Troj/Bckdr-QNP Trojan copies itself to Systemntsasvc.exe.

    5/21: Volume-A Worm Tries to Create Files When Run
    By - May 21, 2008
    W32/Volume-A worm attempts to create the files on any available drive when run.

    5/21: VKon-A Worm Spreads Via Social Networking Site
    By - May 21, 2008
    W32/VKon-A worm spreads using the social networking site Vkontakte.ru.

    5/21: Tiotua-Q Trojan Contains Embedded .Exe File for Spyware Functions
    By - May 21, 2008
    W32/Tiotua-Q is a Trojan for the Windows platform.

    5/21: Agent.LPY a Windows Systems Trojan
    By - May 21, 2008
    W32/Agent.LPY is a Windows systems Trojan.

    5/21: PSWSys-Gen Kernel Driver Records Keystrokes
    By - May 21, 2008
    Troj/PSWSys-Gen is a kernel driver that attempts to record keystrokes silently.

    5/21: Bckdr-QNO Trojan Installs Files, Creates Registry Entries
    By - May 21, 2008
    Troj/Bckdr-QNO is a Trojan for the Windows platform.

    5/21: Mal/EncPk-DX Program Used by Malware Authors
    By - May 21, 2008
    Mal/EncPk-DX is a program packed with a protection system typically used by malware authors.

    5/21: FakeAle-BK Trojan Creates File When Installed
    By - May 21, 2008
    Troj/FakeAle-BK is a Trojan for the Windows platform.

    5/21: NtRootK-DJ a Rootkit Trojan
    By - May 21, 2008
    Troj/NtRootK-DJ is a rootkit Trojan for the Windows platform.

    5/21: Pws-Gina Password-Stealing Trojan Targets User Credentials
    By - May 21, 2008
    Pws-Gina is a password-stealing Trojan designed to steal the credentials of logged in windows user.

    5/21: BackDoor-DPE Trojan Copie and Registers Itself
    By - May 21, 2008
    BackDoor-DPE Trojan is known to have been used in an attack involving Whitehouse.org.

    Labels: , ,